期刊文献+

一种基于行为关联的主机系统入侵检测方法

An intrusion detection method for host systems based on behavior correlation
下载PDF
导出
摘要 提出了一种基于主机行为解析和行为关联分析的主机系统入侵检测方法,对嵌入式恶意软件具有较高的检测效率,可应用于基于网络行为的入侵检测系统。通过对行为进行深层次的解析,建立了行为间的关联关系模型,在降低存储异常行为样本规模的同时,提高了该方法的灵活性和应用范围。实验结果显示,与现有的异常行为检测方法相比,该方法需要较长的训练时间,但是,通过调整行为粒度,该方法可以使训练时间保持在合理的范围之内。随着时间的推进,该方法的性能将逐步提高,在漏报率、误报率及更新效率上,较现有系统都有较大的提高。 A method for detecting intrusions through analyses of host behavior and behavior correlation is proposed. The method can efficiently find out the malicious software that is embedded with anomaly codes, and can be applied to behavior-based intrusion detection systems (IDS). By mining the characters of normal and anomaly behaviors of hosts, a way to build the Markov model of relationship of meta-behaviors and a method to detect intrusions are giv- en. With them, the feasibility and scalability of the proposed method can be enhanced, and the store space can be reduced. The experimental results show that the loss-detection ratio, the error-detection ratio and the renew effi- ciency of the method are better than the existing methods, although it need more time to train datasets.
出处 《高技术通讯》 CAS CSCD 北大核心 2012年第9期897-903,共7页 Chinese High Technology Letters
基金 国家发改委信息安全专项(发改办高技[2010]3044号)和江西省科技厅国际合作计划(2009BHB15100)资助项目.
关键词 关联分析 主机系统 入侵检测系统(IDS) correlation analysis, host system, intrusion detection systems (IDS)
  • 相关文献

参考文献6

二级参考文献52

  • 1尹清波,张汝波,李雪耀,王慧强.基于动态马尔科夫模型的入侵检测技术研究[J].电子学报,2004,32(11):1785-1788. 被引量:9
  • 2田新广,高立志,张尔扬.新的基于机器学习的入侵检测方法[J].通信学报,2006,27(6):108-114. 被引量:15
  • 3S Forrest,S A Hofmeyr,A Somayaji,T A Longstaff.A sense of self for unix processes[A].In 1996 IEEE Symposium on Security and Privacy[C].Los Alamitos,CA:IEEE Computer Society Press,1996.120-128.
  • 4T Lane,C E Brodley.Temporal sequence learning and data reduction for anomaly detection[J].ACM Transactions on Information and System Security,1999,2(3):295-331.
  • 5Lee W,Stolfo S J.Data mining approaches for intrusion detection[A].Proceedings of the 7th USENIX Security Symopsium[C].San Antonio.Texas:the USENIX Association,1998.26-29.
  • 6K Ilgun,R Kemmerer,P Porras.State transition analysis:A rule-based intrusion detection approach[J].IEEE Transactions on Software Engineering,1995,21(3):181-199.
  • 7S Mukkamala,G Janowski,A H Sung.Intrusion detection using neural networks and support vector machines[A].Proceedings of IEEE International Joint Conference on Neural Networks[C].Hawaii,2002.1702-1707.
  • 8Warrender C,Forrest S,Pearlmutter B.Detecting intrusion using system calls:Alternative data models[A].IEEE Symposium on Security and Privacy[C].Oakland,USA;1999.133-145.
  • 9Ye N. A Markov chain model of temporal behavior for anomaly detection. In: Proceedings of the 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, 2000, 166~169
  • 10Jha S., Tan K., Maxion R.A., Roy A. Markov chains, classifiers and intrusion detection. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, 2001, 206~219

共引文献109

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部